Wireless Security and CIA Triad

Now a day, Wireless is becoming a main stream technology. So Wireless security is very important to prevent our WiFi network/host from unwanted users or hackers. There are many encryption protocols use for security. The most common types are-

WEP (Wired Equivalent Privacy)- WEP provides the security same as a Wired network. The wireless works on Radio, so WEP encrypt the data over the Radio Waves. WEP using the STREAM CIPHER RC4 for Confidentiality and CRC-32 checksum for Integrity.

There are two encryption key strength- 64 and 128 Bit but in 2001 a cryptography vulnerability found in WEP protocol. WEP is using the same encryption key to encrypt the data for all devices.

WPA (Wi-Fi Protected Access): WPA is developed by the Wi-Fi Alliance in 2003 to secure the network.  In 2004, they came up with advanced security called WPA2.

WPA uses the TKIP (Temporal Key Integrity Protocol) to change the key.  TKIP generate a new key for each and every packet, thus it’s preventing from attackers to find the key. CRC was using in WEP for Integrity so WIFI Alliance wanted to add a new Integrity so they used TKIP.

The security is improved by adding WPA 2 that is the second version of WPA.

WPA2 uses a new encryption method called Counter Mode with Counter Mode Cipher Block Chaining -Message Authentication Block Protocol (CCMP) with AES which replaced the TKIP.

 

Both WPA and WPA2 includes 2 authentication modes-

Personal and Enterprise.

WPA/WPA2 Personal: use the 256-Bit pre-shared key for encryption. WPA personal also called WPA-PSK.

WPA/WPA2 Enterprise use the Static key. It has username password using RADIUS server. It has complicated setup but providing advanced security. It uses 802.11x or EAP for authentication.

 

TKIP– Temporal Key Integrity Protocol, use the RC4 algorithm. It generates a new key for each packet in the network.

CCMP– short of Counter Mode Cipher Block Chaining -Message Authentication Block Protocol.  CCMP is more secure than TKIP and WEP protocol.

EAP-Extensible Authentication protocol provides Transport Layer security.

CIA Triad- CIA refers 3 component in Network Security

Integrity– Accuracy, and Consistency of data. It means data should be received same at the remote end as the data sent. For example, if you are trying to access a Website and an attacker redirect your traffic to another Website. That is data integrity.

Confidentiality– Confidentiality means your data should be confidential only authorized user can access those data. For example, your bank account. Only you are the authorized access to your bank account.

Availability: It means information should be available for authorized user. Right people can access data at right times. How we ensure Data Availability: Backup at right time.

 

 

6 thoughts on “Wireless Security and CIA Triad

  1. I need to understand this. So important.
    But no… in one ear and out the other 😫

    I trust you work in this industry – you sound like someone who truly knows your stuff.
    Made my tummy flip over with fear in fact as I was hacked twice last year.

    Bastards. 😠

    Liked by 1 person

      1. First time I was in Bahamas and didn’t think twice about downloading an app I had to pay for while using ‘unsecured wifi ‘ … in their hotel. Two days later I wasn’t in the Bahamas any more but some guy was going to the bank machine there and taking $300 out from the Bank of Canada ATM four times in one day before I was alerted….

        Second time.. it’s too embarrassing to admit in public but I will coz it might help some other poor sod who is caught out…
        I was phoned at 1am, sleepily I answered phone and believed the caller who told me he was from fraud team and they’d noticed unusual activity and he could help stop it…
        Hmmm yes, we know where this one went don’t we …

        Sshhh! You don’t need to say anything!!! I KNOW 🙄. Idiot.
        Well now I keep my 87 pence under the mattress …..

        Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s